Описание
The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.
The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-4914
- https://www.debian.org/security/2015/dsa-3265
- http://framework.zend.com/security/advisory/ZF2014-04
- http://jvn.jp/en/jp/JVN71730320/index.html
- http://openwall.com/lists/oss-security/2014/07/11/4
- http://secunia.com/advisories/58847
- http://www.securityfocus.com/bid/68031
Связанные уязвимости
The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.
The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.
The Zend_Db_Select::order function in Zend Framework before 1.12.7 doe ...